“Security begins at home”: Determinants of home computer and mobile device security behavior

N Thompson, TJ McGill, X Wang - computers & security, 2017 - Elsevier
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …

[HTML][HTML] Data privacy concerns using mhealth apps and smart speakers: Comparative interview study among mature adults

T Schroeder, M Haug, H Gewald - JMIR formative research, 2022 - formative.jmir.org
Background New technologies such as mobile health (mHealth) apps and smart speakers
make intensive use of sensitive personal data. Users are typically aware of this and express …

[HTML][HTML] “I Got the Job!”: An exploratory study examining the psychological factors related to status updates on facebook

M Dupuis, S Khadeer, J Huang - Computers in Human Behavior, 2017 - Elsevier
Status updates on Facebook are a common enough phenomenon. When something good
happens in one's life, an update may be posted. Conversely, when something isn't going …

Comparing experts' and users' perspectives on the use of password workarounds and the risk of data breaches

MJ Rooney, Y Levy, W Li, A Kumar - Information & Computer Security, 2024 - emerald.com
Purpose The increased use of Information Systems (IS) as a working tool for employees
increases the number of accounts and passwords required. Despite being more aware of …

Effects of peer feedback on password strength

M Dupuis, F Khan - 2018 APWG Symposium on Electronic …, 2018 - ieeexplore.ieee.org
Passwords have dominated the world of authentication. Their widespread use has made
them a prized target for attackers. Various schemes have been employed to strengthen …

The use and non-use of cybersecurity tools among consumers: Do they want help?

M Dupuis, T Geiger, M Slayton, F Dewing - Proceedings of the 20th …, 2019 - dl.acm.org
Cybersecurity behavior changes over time, as do the recommendations for how one may
best protect themselves from cybersecurity threats. This paper examines current trends in …

My voiceprint is my authenticator: A two-layer authentication approach using voiceprint for voice assistants

YT Chang, MJ Dupuis - … & Communications, Cloud & Big Data …, 2019 - ieeexplore.ieee.org
Voice assistants are a ubiquitous service of contemporary daily life. Their intuitive use and
24-hour-a-day convenience make them popular with an increasing user base. However, the …

Help wanted: Consumer privacy behavior and smart home internet of things (iot) devices

M Dupuis, M Ebenezer - Proceedings of the 19th annual SIG conference …, 2018 - dl.acm.org
The infrastructure of smart home IoT devices is complex and the combination of data
streams that run throughout it is convoluted. This poses a threat to consumer privacy …

Fear might motivate secure password choices in the short term, but at what cost?

M Dupuis, K Renaud… - … Conference on System …, 2022 - strathprints.strath.ac.uk
Fear has been used to convince people to behave securely in a variety of cyber security
domains. In this study, we tested the use of fear appeals, with the threat appraisal and …

Where is our data? A blockchain-based information chain of custody model for privacy improvement

W Silva, ACB Garcia - 2021 IEEE 24th International Conference …, 2021 - ieeexplore.ieee.org
The advancement of Information and Communication Technologies has brought numerous
facilities and benefits to society. In this environment, surrounded by technologies, data, and …